Static task
static1
Behavioral task
behavioral1
Sample
b983f782baf643088004776eae59fd10_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b983f782baf643088004776eae59fd10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b983f782baf643088004776eae59fd10_NeikiAnalytics.exe
-
Size
56KB
-
MD5
b983f782baf643088004776eae59fd10
-
SHA1
d3b648cb69d25e0a067d38f467a821db67eaa7b2
-
SHA256
e61ef2bbc4a54a0113f04b27257c17f52bd7173b746cdaaf9243e71163441104
-
SHA512
c39ac924c66718c581c42d2f5e14be5fa10da40b8bd1852da846a7daa2e99668754dbd93bcced4785cb76825bf51fe4a5567bf3f38883c4acf8bb8e94c425fea
-
SSDEEP
768:OzjYf9+FcDw1UmGXb2sWtJfz4ssyWI7W+3ZxY7C9sESnvFjDXP2AQ:OzjjUmDh8B+3ZxY7C9s7nvF/PC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b983f782baf643088004776eae59fd10_NeikiAnalytics.exe
Files
-
b983f782baf643088004776eae59fd10_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
0c436428c0a0ccbcc42bb2fe995934ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pwctrl32
ord100
npw32
ord7
ord30
ord5
pwutlu32
ord210
ord101
ord100
ord256
ord200
pwdial32
ord22
pwddir32
ord34
ord2
ord30
ord36
ord5
ord29
ord10
fileio32
WriteFile32
OpenFile32
ReadFile32
CloseFile32
ctl3d32
ord6
ord12
ord16
ord13
comdlg32
GetOpenFileNameA
CommDlgExtendedError
user32
IsIconic
SetForegroundWindow
FindWindowA
OpenIcon
LoadCursorA
RegisterClassA
GetParent
LoadStringA
DefDlgProcA
ReleaseDC
CreateDialogParamA
GetWindowLongA
PackDDElParam
IsDialogMessageA
TranslateMessage
DispatchMessageA
DestroyIcon
FreeDDElParam
DefWindowProcA
CreateWindowExA
GetFocus
CallWindowProcA
GetDesktopWindow
GetWindowThreadProcessId
MoveWindow
WinHelpA
UnhookWindowsHookEx
UnpackDDElParam
ShowWindow
GetMessageA
PostQuitMessage
GetDC
SetWindowsHookExA
CharLowerA
SendMessageA
SetCursor
GetWindowRect
MessageBoxA
CheckRadioButton
GetSystemMetrics
EnableWindow
DialogBoxParamA
IsDlgButtonChecked
GetDlgItemTextA
GetDlgItem
SetWindowLongA
CheckDlgButton
EndDialog
CharUpperA
SetTimer
wsprintfA
SetDlgItemTextA
SetMenu
GetSystemMenu
RemoveMenu
PostMessageA
SendDlgItemMessageA
InvalidateRect
BeginPaint
DrawIcon
EndPaint
KillTimer
DestroyWindow
LoadMenuA
LoadIconA
PeekMessageA
CallNextHookEx
kernel32
FileTimeToDosDateTime
GlobalDeleteAtom
GetModuleFileNameA
FileTimeToLocalFileTime
Sleep
GetFileTime
GetProfileStringA
GetProfileIntA
GetLocalTime
MulDiv
GetPrivateProfileStringA
GlobalAddAtomA
GetModuleHandleA
GetStartupInfoA
LocalAlloc
LocalLock
lstrcpyA
FindFirstFileA
FindNextFileA
LocalHandle
LocalUnlock
LocalFree
GlobalHandle
GlobalUnlock
GetPrivateProfileIntA
lstrcatA
GlobalAlloc
GlobalLock
GlobalFree
WritePrivateProfileStringA
lstrcmpiA
lstrlenA
gdi32
DeleteObject
CreateFontA
GetDeviceCaps
GetStockObject
GetObjectA
msvcrt40
_rmdir
_chdir
_mkdir
_getcwd
_XcptFilter
__p__acmdln
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
_initterm
_ftol
exit
_stat
_exit
localtime
time
rename
atof
atol
atoi
_gcvt
strrchr
strchr
memcpy
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ